Console Login

#Linux Security

All articles tagged with Linux Security

#Linux Security

Zero-Trust Infrastructure: Why the "Castle and Moat" is Failing Your Norwegian Data

The perimeter is dead. With GDPR enforcement looming in 2018, relying on a VPN is no longer sufficient. We dissect how to implement Google-style Zero Trust architecture using standard Linux tools and CoolVDS KVM instances.

Kill the VPN: Why Zero-Trust Architecture is the Only Way to Survive 2017

The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.

Perimeter Security is Dead: Implementing a Zero-Trust Architecture on Linux in 2017

With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.

The Perimeter is Dead: Implementing a Zero-Trust Architecture on Linux Infrastructure

The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.

The Perimeter is Dead: Implementing Zero-Trust Architecture on Linux (2017 Guide)

The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.

Zero-Trust Architecture: Why Your Firewall is a False Idol (And How to Fix It)

The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.

Container Isolation Myths: Hardening Docker 1.12 on Production Linux Systems

Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.

Surviving the Apocalypse: A Norwegian Sysadmin’s Guide to Disaster Recovery (2016 Edition)

RAID is not a backup. Snapshots are not a strategy. We define a battle-tested Disaster Recovery plan using MySQL 5.7 GTID replication, Lsyncd, and off-site Norwegian cold storage to keep your RTO under 15 minutes.

The Perimeter is Dead: Implementing Zero-Trust Security on Your VPS in 2016

The 'Castle and Moat' security model has failed. Learn how to architect a Zero-Trust environment using strict iptables, 2FA, and segmented networks on CoolVDS infrastructure. Stop trusting your LAN.

The Perimeter is Dead: Implementing Zero Trust Architecture on Linux Infrastructure (2016 Guide)

With the recent death of Safe Harbor and the looming GDPR enforcement, the 'castle and moat' security strategy is obsolete. Here is a pragmatic guide to implementing micro-segmentation and strict access controls on your Norwegian VPS infrastructure.

Container Security in Production: Surviving the Docker Hype Without Root Exploits

It is July 2016, and Docker 1.12 has just dropped. But before you deploy Swarm mode, understand why running containers as root is a disaster waiting to happen. A deep dive into capabilities, CoW filesystems, and Norwegian data sovereignty.

Disaster Recovery in 2016: Why Your "Backups" Won't Save You When the SAN Melts

RAID is not a backup. Snapshots are not a strategy. A battle-hardened look at designing failover systems for Norwegian infrastructure using MySQL replication, rsync, and KVM isolation.

Container Security: Hardening Docker on Linux in the Post-Safe Harbor Era

Docker is revolutionizing deployment, but its default configuration is a security minefield. We dive into kernel capabilities, user namespaces, and why KVM isolation is non-negotiable for Norwegian data compliance in 2016.

Stop the SSH Madness: Implementing Git-Driven Deployment Pipelines on Linux

It is 2015, and editing config files manually in production is no longer acceptable. Learn how to implement 'Infrastructure as Code' using Git hooks, Ansible, and Docker to ensure your Norwegian VPS environments are reproducible and robust.

The Perimeter is Dead: Architecting 'Zero Trust' Security on Linux in 2015

The 'Castle and Moat' security strategy is failing. Learn how to implement a Zero Trust architecture today using KVM, strict IPTables, and Two-Factor Authentication to secure your Norwegian infrastructure against modern threats.

Paranoia is a Virtue: The 2012 Guide to Linux Server Hardening in Norway

Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.

Escaping Subversion: Building a Bulletproof Private Git Server with Gitolite in Norway

Stop relying on US-hosted code repositories. Learn how to deploy a secure, low-latency Git server using Gitolite on a Norwegian VPS, ensuring compliance with local data laws and maximizing push/pull speeds.

Locking Down Your Linux Box: Essential Server Hardening Survival Guide (2011 Edition)

Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.

Fortifying the Castle: Essential Linux Server Hardening for 2012

With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.

Bulletproof Postfix: Building an Enterprise Mail Gateway on CentOS 6

Stop trusting shared IPs with your business communications. A battle-hardened guide to configuring Postfix for maximum deliverability, speed, and security on a dedicated VPS environment.

Linux Server Hardening: The 15-Minute Drill to Lock Down Your Box

A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.

Linux Server Hardening: Survival Guide for the Paranoid SysAdmin (2011 Edition)

It is 2011, and the script kiddies are winning. Learn how to lock down your CentOS 6 or Debian Squeeze server using iptables, SSH keys, and proper KVM isolation before you become the next LulzSec statistic.

Hardening Your Linux VPS: A Battle-Tested Security Guide

Security isn't a feature; it's a requirement. Learn the essential steps to lock down your Linux server, from iptables to SSH keys, and why Norwegian data sovereignty matters more than ever.

Lock It Down: The Definitive Linux Server Hardening Guide (2011 Edition)

In an era of rising botnets and script kiddies, a default installation is a ticking time bomb. We cover the essential steps to secure your CentOS and Debian servers, from iptables to SSH keys, ensuring your Norwegian infrastructure stays online.

Lockdown 2011: The Definitive Guide to Linux Server Hardening

In an era of rising hacktivism, default Linux installs are not safe. Learn the battle-tested strategies to secure your CentOS and Debian servers, from iptables to kernel hardening, tailored for the Norwegian hosting market.

Paranoid Penguin: 5 Essential Steps to Harden Your Linux VPS in 2011

Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.

Sleep Through the Night: The Battle-Hardened Guide to Automated Backups in 2011

Disaster recovery isn't a luxury; it's survival. From rsync scripts to MySQL consistency, learn how to secure your data against hardware failure and human error while navigating Norwegian data laws.

The Paranoid Sysadmin’s Guide to Linux Server Hardening (2011 Edition)

A default Linux install is a sitting duck for botnets. From crafting strict iptables chains to locking down SSH, here is the battle-tested configuration for securing your Norwegian VPS infrastructure.

Rootkits Don't Sleep: The Definitive Linux Server Hardening Guide (2011 Edition)

Stop relying on default configurations. Learn how to lock down SSH, configure iptables manually, and protect your Norwegian VPS from the growing wave of automated botnets.

Lock It Down: The 2011 Guide to Hardening Your Linux Server in Norway

A default Linux installation is a welcome mat for attackers. From iptables to SSH keys, here is the battle-tested guide to securing your Norwegian VPS against script kiddies and targeted intrusions.